CMSimple 3.1 Local File Inclusion Vulnerability CVE-2008-2650 Scanner

Details
Stay Up To Date
Asset Type

domain,ip,url

Need Membership

Yes

Asset Verify

Yes

API Support

Yes

Estimate Time (Second)

15

CMSimple 3.1 Local File Inclusion Vulnerability CVE-2008-2650 Scanner Detail

In CMSimple through 3.1, there is Local File Inclusion vulnerability in the cmsimple/cms.php file.

Directory traversal vulnerability in cmsimple/cms.php in CMSimple 3.1, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php. NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number.

Some Advice for Common Problems

  1. Update your CMSimple application, to the latest version to eliminate this vulnerability.
  2. Sanitize all parameters received as input from the user.

Need a Full Assesment?

Get help from professional hackers. Learn about our penetration test service now!

Request Pentest Service